intel / cve-bin-toolLinks
The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 350 common, vulnerable components (openssl, libpng, libxml2, expat and others), or if you know the components used, you can get a list of known vulnerabilities associated with an SBOM or a list of components and versions.
☆1,458Updated this week
Alternatives and similar repositories for cve-bin-tool
Users that are interested in cve-bin-tool are comparing it to the libraries listed below
Sorting:
- A free and open vulnerabilities database and the packages they impact. And the tools to aggregate and correlate these vulnerabilities. Sp…☆600Updated this week
- Pilot program for CVE submission through GitHub. CVE Record Submission via Pilot PRs ending 6/30/2023☆1,483Updated last month
- A fork and successor of the Sulley Fuzzing Framework☆2,177Updated last month
- Open source vulnerability DB and triage service.☆1,920Updated last week
- Open Source Package Analysis☆834Updated 3 months ago
- cwe_checker finds vulnerable patterns in binary executables☆1,231Updated 3 months ago
- Resources related to GitHub Security Lab☆1,509Updated last week
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,627Updated last year
- Firmware Analysis and Comparison Tool☆1,351Updated last week
- cve-search - a tool to perform local searches for known vulnerabilities☆2,494Updated last week
- ClusterFuzzLite - Simple continuous fuzzing that runs in CI.☆492Updated 7 months ago
- Global Security Database☆319Updated last year
- a static analysis tool for finding vulnerabilities in C/C++ source code☆533Updated 11 months ago
- EMBA - The firmware security analyzer☆3,043Updated last week
- LLM powered fuzzing via OSS-Fuzz.☆1,244Updated this week
- Semgrep Community Edition rules, maintained by Semgrep and the community. Free to use under the Semgrep Rules License.☆938Updated last week
- A collection of my Semgrep rules to facilitate vulnerability research.☆654Updated last month
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆700Updated last month
- Tracking CVEs for the linux Kernel☆748Updated last year
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆758Updated 3 weeks ago
- Binary Analysis Next Generation (BANG)☆504Updated last week
- IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly foun…☆782Updated 7 months ago
- EMBArk - The firmware security scanning environment☆350Updated last week
- Checksec☆2,189Updated 2 weeks ago
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆316Updated last week
- An open source threat modeling tool from OWASP☆1,137Updated last week
- A simple wrapper for the National Vulnerability CVE/CPE API☆99Updated last month
- Repository for information about 0-days exploited in-the-wild.☆809Updated last week
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆423Updated 3 years ago
- ☆1,497Updated last year